Multi agent system for network attack classification using flow-based intrusion detection
暂无分享,去创建一个
[1] Bryan Krekel,et al. Capability of the People's Republic of China to Conduct Cyber Warfare and Computer Network Exploitation , 2009 .
[2] Lik Mui,et al. Notions of reputation in multi-agents systems: a review , 2002, AAMAS '02.
[3] Chhaya Das,et al. Analysis of Distributed Intrusion Detection Systems Using Mobile Agents , 2008, 2008 First International Conference on Emerging Trends in Engineering and Technology.
[4] V. Paxson,et al. WHERE MATHEMATICS MEETS THE INTERNET , 1998 .
[5] Songwu Lu,et al. Random flow network modeling and simulations for DDoS attack mitigation , 2003, IEEE International Conference on Communications, 2003. ICC '03..
[6] B. Melamed,et al. Traffic modeling for telecommunications networks , 1994, IEEE Communications Magazine.
[7] David G. Stork,et al. Pattern classification, 2nd Edition , 2000 .
[8] M. Becchi. From Poisson Processes to Self-Similarity: a Survey of Network Traffic Models , 2006 .
[9] Robert Tibshirani,et al. The Elements of Statistical Learning: Data Mining, Inference, and Prediction, 2nd Edition , 2001, Springer Series in Statistics.
[10] D. Ruppert. The Elements of Statistical Learning: Data Mining, Inference, and Prediction , 2004 .
[11] Gary B. Lamont,et al. Multi agent systems on military networks , 2011, 2011 IEEE Symposium on Computational Intelligence in Cyber Security (CICS).
[12] Gary B. Lamont,et al. Self organized multi-agent entangled hierarchies for network security , 2009, GECCO '09.
[13] Wayne A. Jansen,et al. Intrusion detection with mobile agents , 2002, Comput. Commun..
[14] Sean Luke,et al. MASON: A New Multi-Agent Simulation Toolkit , 2004 .
[15] Albert,et al. Emergence of scaling in random networks , 1999, Science.
[16] Aiko Pras,et al. An Overview of IP Flow-Based Intrusion Detection , 2010, IEEE Communications Surveys & Tutorials.